International Telecommunication Union   ITU
 
 
Site Map Contact us Print Version
 Tuesday, September 21, 2010

Harrisburg University has banned these social media sites, as well as MySpace and AOL Instant Messenger, for one week on the Pennsylvania campus, starting September 13.

The ban is not because of any security or privacy issue. Rather, it is an experiment to make students and faculty members think about the significance of social media and how best to benefit from this channel in its absence. "We're not trying to stop all access to these sites," says Charles Palmer, executive director of the Center for Advanced Entertainment and Learning Technologies. "We're trying to enhance people's ability to reflect on how technology impacts their daily lives and really generate valuable conversations." According to Jeffery Mechling, a prominent author and lecturer at the Harvard Kennedy School, "People depend a lot on those they trust. Making those connections easier is powerful, as social media have demonstrated. But this is a new phenomenon, so studying and understanding better is valuable."

 

(Source: Bank Info Security)

Full story

Bank Info Security

Tuesday, September 21, 2010 4:42:46 PM (W. Europe Standard Time, UTC+01:00)  #     | 

In UK, ISPs must pay 25 per cent of the cost of implementing new anti-piracy measures, it has been announced. The process of identifying and informing broadband customers suspected of copyright infringement will be paid for partially by ISPs and copyright holders, who will pay the other 75 per cent.

The decision comes as the government attempts to thrash out the details of how some parts of the controversial Digital Economy Act will actually work in practice. Minister for Communications, Ed Vaizey, said: "Protecting our valuable creative industries, which have already suffered significant losses as a result of people sharing digital content without paying for it, is at the heart of these measures. "The Digital Economy Act serves to reduce online copyright infringement through a fair and robust process and at the same time provides breathing space to develop better business models for consumers who buy music, films and books online.

 

(Source: Webuser)

Full story

Webuser

Tuesday, September 21, 2010 3:25:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 20, 2010

The 2011 Global State of Information Security Survey is a worldwide security survey by PricewaterhouseCoopers, CIO Magazine and CSO Magazine. It was conducted online from February 19, 2010 to March 4, 2010. Readers of CIO and CSO Magazines and clients of PricewaterhouseCoopers from around the globe were invited via email to take the survey. The results discussed in this report are based on the responses of more than 12,840 CEOs, CFOs, CIOs, CSOs, vice presidents and directors of IT and information security from 135 countries. Thirty-seven percent of respondents were from Asia, 30% from Europe, 17% from North America, 14% from South America, and 2% from the Middle East and South Africa. For the main finadins please click here

 

(Source: Price Waterhouse Coopers)

Monday, September 20, 2010 12:59:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Germany is the first country to launch a large scale malware cleaning project backed by the government, Internet service providers and security companies.

The new Anti-Botnet Counseling Center (Anti-Botnet Beratungszentrum) is an organization dedicated to assisting German users with removing botnet infections from their computers. It was established with funding from the Federal Ministry of Interior and the technical assistance is provided by the Federal Office for Information Security (BSI). The initiative was announced late last year as a collaboration between the Federal Government and the German Internet Industry Association (eco).

 

(Source: Softpedia)

Full story

Softpedia

Monday, September 20, 2010 12:56:00 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 16, 2010

Sometimes it's a story of a grown woman who has chosen prostitution as a path to a better life. More often, it's a story of a woman being forced to sell her body by a pimp. And then there are the children, and the mothers that miss them.

"They told me to look on Craigslist and it almost blew my mind," the mother of one missing 12-year-old told CNN. "She was there with a wig on. She was there in a purple negligee. The same day the woman spoke to CNN, her daughter was rescued by police at a seedy hotel near Washington where she was being sold for sex. And she's not alone. The National Center for Missing and Exploited Children's website contains thousands of posters of missing children. Many are girls, classified as "endangered runaways," and the center says more than fifty of them have been pushed into the sex trade. But that's just a snapshot, a tiny indicator of the true scale of the problem.

 

(Source: CNN)

Full story

CNN

Thursday, September 16, 2010 4:57:07 PM (W. Europe Standard Time, UTC+01:00)  #     | 

An awkwardly-worded reply by Defence Secretary Liam Fox to questions in the House of Commons suggests that cuts in information security spending are not on the agenda for the Strategic Defence and Security Review (SDSR), which is due to report back in the Autumn. On the contrary, Britain is looking to boost its capabilities in the area. Cyber-security is an important element of the SDSR and has already had considerable consideration. Decisions on enhancing our capabilities will form part of the review, which we will announce to the House later this autumn.

Developing a military cyber-security policy should not be the responsibility of the Ministry of Defence alone, Fox added. Investing in better cyber-security will not be an option for the United Kingdom. What is being considered under the National Security Council as part of the SDSR is how that occurs. We will face increasing threats in cyberspace in the years ahead-the question is how we identify the weakest areas, which need to be looked at first, and how we develop the technologies so that, as the other technologies that might affect us continue to evolve, we are best protected.

 

(Source: The register)

Full story

The register

Thursday, September 16, 2010 12:42:52 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The Millennium Development Goals (MDGs) are a set of targets intended to reduce global poverty and improve living standards by 2015. Specific goals target education, fighting disease and promoting gender equality. Access to communications technology is a part of one of the targets. With five years to go until the deadline to achieve the goals, progress remains uneven. Some countries have achieved many of the goals, while others - mostly in the developing world - may not realise any. Many development experts question how the goals will be achieved and how they will be paid for. Some even question whether the approach is necessary or helpful.

But Dr Toure said that he believed technologies such as broadband could be used to "accelerate" progress on the goals and help countries achieve them. "Access to broadband in an affordable manner is our greatest challenge," Dr Hamadoun Toure, secretary general of the International Telecommunications Union (ITU), told BBC News.

 

(Source: BBC)

Full story

BBC

Thursday, September 16, 2010 12:06:03 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, September 14, 2010

Make your password strong, with a unique jumble of letters, numbers and punctuation marks. But memorize it — never write it down. And, oh yes, change it every few months. These instructions are supposed to protect us. But they don’t.

Some computer security experts are advancing the heretical thought that passwords might not need to be “strong,” or changed constantly. They say onerous requirements for passwords have given us a false sense of protection against potential attacks. In fact, they say, we aren’t paying enough attention to more potent threats. Here’s one threat to keep you awake at night: Keylogging software, which is deposited on a PC by a virus, records all keystrokes — including the strongest passwords you can concoct — and then sends it surreptitiously to a remote location.

 

(Source: The New York Times)

Full story

The New York Times

Tuesday, September 14, 2010 4:10:59 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Monday, September 13, 2010

ICT For Health Projects Exhibiting

27 September 2010 - 29 September 2010 Brussels, Belgium

The ICT for Health projects present at the ICT2010 conference. CD-Medics, Epilepsiae, HeartCycle, Hamam and Oldes will be exhibiting. Three eHealth related networking sessions will also take place on the following topics: Patient empowerment, EU-ASEAN Cooperation opportunities and Low-cost Imaging Technologies for Healthcare.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society 

Monday, September 13, 2010 5:47:49 PM (W. Europe Standard Time, UTC+01:00)  #     | 

With its millions of users, the world’s most popular social network has become a perfect target for hackers exploiting such a dense concentration of potential victims. Apart from phishing attacks or spam, which are now easily recognized by many Internet users, hackers are employing new methods, which for the moment at least, are proving to be successful. What to do if your Facebook profile has been hacked

Step 1: Firstly, remove all permissions that have been given to the malicious application. This is a simple process: from Account > Application settings in the top-right corner of your Facebook profile. This ensures that the application will not continue to have access to your profile once the password is changed.

Step 2: Change the login password! To keep your identity safe, it is advisable to change your password and the user name (it’s a good idea to do this from time to time anyway). This is also easy: Go to Account > and Account Settings in the menu in the top left corner of your Facebook profile. It is also advisable to use strong passwords that cannot easily be guessed.

 

(Source: Panda Security)

Full story

Panda Security

Monday, September 13, 2010 5:45:33 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Friday, September 10, 2010

Every week, hackers are creating 57,000 new Web addresses which they position and index on leading search engines in the hope that unwary users will click them by mistake. Those who do, will see their computers infected or any data they enter on these pages fall into the hands of criminals. To do this, they use an average of 375 company brands and names of private institutions from all over the world, all of them instantly recognizable.

eBay, Western Union and Visa top the rankings of the most frequently used keywords; followed by Amazon, Bank of America, Paypal and the US revenue service. This way, when users search for these names, a link to the malicious website will appear among the first results returned. When they visit these sites, one of two things will happen: either malware will be downloaded onto the user’s computer, with or without their knowledge, or the website spoofs the appearance of a genuine page, a bank say, and users will unwittingly enter their details which will fall into the hands of criminals.

 

(Source: Panda Security)

Full story

Panda Security

Friday, September 10, 2010 5:12:31 PM (W. Europe Standard Time, UTC+01:00)  #     | 

A booby-trapped e-mail that promises free sex movies is racking up victims around the world, warn security firms. Some variants of the Windows worm contain a link to PDF that a recipient has been told to expect. Those clicking on the link get neither movies nor documents but give the malware access to their entire Outlook address book. When installed, the worm sends copies of itself to every e-mail address it can find.

The malicious e-mail messages have a subject line saying "Here you have" and contain a weblink that looks like it connects to a PDF document. Instead it actually links to a website hosting the malware.

 

(Source: BBC)

Full story

BBC

Friday, September 10, 2010 5:08:26 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, September 09, 2010

While social media use has grown dramatically across all age groups, older users have been especially enthusiastic over the past year about embracing new networking tools. Social networking use among internet users ages 50 and older nearly doubled—from 22% in April 2009 to 42% in May 2010.

- Between April 2009 and May 2010, social networking use among internet users ages 50-64 grew by 88%--from 25% to 47%.

- During the same period, use among those ages 65 and older grew 100%--from 13% to 26%.

- By comparison, social networking use among users ages 18-29 grew by 13%—from 76% to 86%.

 

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, September 09, 2010 4:38:41 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The personal details of thousands of football fans who bought World Cup tickets from official FIFA outlets have been stolen and sold for up to £500,000. Investigators are now trying to establish who purchased the information, which includes the passport details and dates of birth of up to 250,000 supporters, amid concerns it could have fallen into the hands of criminal gangs or even terrorist groups. The massive data breach, which leaves fans open to identity theft and fraud, is now the subject of a criminal investigation. It has been alleged that an employee of one ticketing agency may have been offering the information for sale. The stolen database is understood to have been compiled by FIFA, football’s world governing body, in the run-up to the 2006 World Cup in Germany.

 

(Source: Daily Mail)

Full story

Daily Mail

Thursday, September 09, 2010 4:32:48 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Tuesday, July 06, 2010

The Safer Internet Forum has been organized by the Safer Internet Programme as an annual conference on safer internet issues since 2004. It brings together representatives of industry, law enforcement authorities, child welfare organizations and policy makers. The past editions of the Safer Internet Forum have welcomed guests not only from Europe, but also from countries such as Australia, Brazil or the Russian Federation.

The 2010 edition of the Safer Internet Forum will take place in Luxembourg on the 21-22 October. This year the Safer Internet Forum will focus on the results of two major research projects funded by the Safer Internet Programme: EUKidsOnline II, which surveyed children and parents in 25 European countries about internet use, and European Online Grooming Project, the first European research project that studies the characteristics and behaviour of sexual offenders who have used the internet to groom young people.

 

(Source: Europe's Information Society)

Full story

Europe's Information Society

Tuesday, July 06, 2010 10:57:02 AM (W. Europe Standard Time, UTC+01:00)  #     | 

A new targeted malware attack is threatening UK bank customers. Security firm Trusteer said that it has spotted a malware attack that compromises user credentials by creating a fake bank log-in page and then uses those credentials to perform an "authorised" monetary transfer. The attack is being spread through multiple infection methods, including web-based exploits and spam email attachments. Rather than aim to infect numerous systems around the world, however, the company said that the attack is specifically targeting the UK and focusing on very few banks at a time, anywhere from three to seven in a single run.

The UK is not the first country to be targeted for such attacks. Trusteer has spotted similar operations in South Africa and Germany.

 

(Source: v3.co.uk)

Full story

v3.co.uk

Tuesday, July 06, 2010 10:05:48 AM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, July 01, 2010

Americans use a range of approaches to keep informed about what is happening in their communities and online activities have been added to the mix. Face-to-face encounters and phone calls remain the most frequent methods of interaction with neighbors. At the same time, internet tools are gaining ground in community-oriented communications. In a poll conducted at the end of last year, we asked about online connections to communities and neighbors and found that in the twelve months preceding our survey:

- 22% of all adults (representing 28% of internet users) signed up to receive alerts about local issues (such as traffic, school events, weather warnings or crime alerts) via email or text messaging.

- 20% of all adults (27% of internet users) used digital tools to talk to their neighbors and keep informed about community issues.

 

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, July 01, 2010 3:37:43 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Finland has become the first country in the world to make broadband a legal right for every citizen. From 1 July every Finn will have the right to access to a 1Mbps (megabit per second) broadband connection. Finland has vowed to connect everyone to a 100Mbps connection by 2015.

Finland's communication minister Suvi Linden explained the thinking behind the legislation: "We considered the role of the internet in Finns everyday life. Internet services are no longer just for entertainment. "Finland has worked hard to develop an information society and a couple of years ago we realised not everyone had access," she said. It is believed up to 96% of the population are already online and that only about 4,000 homes still need connecting to comply with the law.

 

(Source: BBC)

Full story

BBC

Thursday, July 01, 2010 3:30:20 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, June 17, 2010

New Zealand has joined a global taskforce to fight online child exploitation. Police Superintendent Win Van Der Velde today signed an agreement with the Virtual Global Taskforce (VGT) board in Rome. VGT is made up of international law enforcement agencies, and Deputy Commissioner Rob Pope said joining strengthened an already firm resolve to tackle the online abuse of children. Police will collaborate with VGT through its Online Child Abuse Exploitation Squad (OCEANZ). VGT is chaired by the Australian Federal Police.

 

(Source: New Zealand Herald)

Full story

New Zealand Herald

Thursday, June 17, 2010 4:35:02 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Experts from nearly 40 countries gathered in the Estonian capital Tallinn to discuss the latest issues in the fight against virtual attackers. Estonian President Toomas Hendrik Ilves opened the conference with a stark warning about the seriousness of cybercrime. "Our critical infrastructure, electricity grids, transportation networks and mobile phone networks are so enmeshed and tied to the internet that any open society is open to complete and utter failure," he said. "There are no smoking guns, no foot or fingerprints in virtual reality," Estonia's Minister of Defence Jaak Aviksoo added.

Skilled hackers at the conference said malware designed to be used in attacks could be purchased for a few hundred dollars online, or even downloaded for free.

 

(Source: BBC)

Full story

BBC

Thursday, June 17, 2010 4:31:24 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, June 16, 2010

Police have arrested 178 people in Europe and the United States suspected of cloning credit cards in an international scam worth over 20 million euros ($24.52 million), Spanish police said on Tuesday. Police in fourteen countries participated a two-year investigation, initiated in Spain where police have discovered 120,000 stolen credit card numbers and 5,000 cloned cards, arrested 76 people and dismantled six cloning labs. The raids were made primarily in Romania, France, Italy, Germany, Ireland and the United States, with arrests also made in Australia, Sweden, Greece, Finland and Hungary.

 

(Source: Reuters)

Full story

Reuters

Wednesday, June 16, 2010 5:02:10 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The sentence was announced by United States Attorney for the District of Maryland Rod J. Rosenstein, Special Agent in Charge Richard A. McFeely of the Federal Bureau of Investigation; Chief James W. Johnson of the Baltimore County Police Department; and Baltimore County State’s Attorney Scott Shellenberger.

This case was brought as part of Project Safe Childhood, a nationwide initiative to combat the growing epidemic of child sexual exploitation and abuse launched in May 2006 by the Department of Justice. Led by United States Attorneys’ Offices and the Criminal Division's Child Exploitation and Obscenity Section (CEOS), Project Safe Childhood marshals federal, state, and local resources to better locate, apprehend, and prosecute individuals who exploit children via the internet, as well as to identify and rescue victims.

 

(Source: Baltimore FBI)

Full story

Baltimore FBI

Wednesday, June 16, 2010 4:59:56 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, June 10, 2010

Federal chief information officers and chief information security officers will convene Monday, June 14, at an annual information technology conference where they are sure to discuss the Office of Management and Budget's mandate to look toward cloud computing to cut IT costs, increase efficiencies and enable greater government-wide collaboration and data exchange. In examining the potential benefits and vulnerabilities of moving their services to the cloud, government CIOs and CISOs should ask and demand answers to some difficult questions.

Does your provider ensure the confidentiality, integrity and availability with mature processes, proof of past performance, understanding of and mechanisms for disaster recovery options, and encrypted backups?

 

(Source: GovInfo Security)

Full story

GovInfo Security

Thursday, June 10, 2010 3:14:20 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Driven by the popularity of online video among 18-29 year-olds, there have been dramatic increases since 2007 in the number of American adults watching:

  • Comedy or humorous videos, rising in viewership from 31% of adult internet users in 2007 to 50% of adult internet users in the current survey
  • Educational videos, rising in viewership from 22% to 38% of adult internet users
  • Movies or TV show videos, rising in viewership from 16% to 32% of adult internet users
  • Political videos, rising in viewership from 15% to 30% of adult internet users

One in seven adult internet users (14%) have uploaded a video to the internet, almost double the 8% who were uploading video in 2007. Home video is far and away the most popular content posted online, shared by 62% of video uploaders. And uploaders are just as likely to share video on social networking sites like Facebook (52% do this) as they are on more specialized video-sharing sites like YouTube (49% do this).

(Source: Pew Research Center)

Full story

Pew Research Center

Thursday, June 10, 2010 2:37:22 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Sixty-eight percent of service providers say outbound spam costs them up to $100,000 per year, according to a new research study by industry analyst firm Osterman Research and Commtouch. Some key findings from the research include:

  • 68 percent of service providers say outbound spam costs them up to $100,000 per year; 4 percent said it is costing them more than $250,000 per year. Costs due to outbound spam include such things as IT helpdesk and anti-abuse team time.
  • Almost 40 percent of respondents have had their IP addresses listed on Real Time Blackhole Lists (RBLs) in the past 12 months alone. RBLs are published lists of the addresses of computers or networks known to be sending out spam. A service provider may be blacklisted as a result of outbound spam, and thus have its customers legitimate email blocked by other service providers.
  • Nearly 70 percent of service providers are in the process of evaluating solutions for their outbound spam problem. 50 percent expect to deploy a solution within the next 12 months.

(Source: Security Matters)

Full story

Security Matters

Thursday, June 10, 2010 1:56:50 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Thursday, June 03, 2010

The 12th International Conference on e-Health Networking, Application & Services aims to bring together interested parties from around the world working in the healthcare field to exchange ideas, to discuss innovative and emerging solutions and to develop collaborations. Participants include clinicians, hospital administrators, IT professionals, researchers, educators, healthcare solutions vendors, and consultants. It will also offer an important forum for discussions on e-Health projects supported by world bodies such as ITU, WHO and the EU, including FP6 and FP7 European projects.

 

(Source: IEEE Communications Society)

Full story

IEEE Communications Society

Thursday, June 03, 2010 4:13:23 PM (W. Europe Standard Time, UTC+01:00)  #     | 

With over 3.4 million users of the internet in Kenya, research indicates that the importance of the internet outstrips those of several key developed countries. Even so, the latent demand for local content is underlined by the fact that surveys show that lack of local content is the main reason many Kenyans shy away from accessing the internet. On the launch of the grant facility, the CEO, Kenya ICT Board Paul Kukubo, commented, “We are pleased that we are launching this grant at a time that the ICT industry is growing and access to the internet all over the country has vastly improved.

The future for content industry is bright. Talent, creativity and skills are key drivers of competitiveness in the content sector and we expect that this grant will enable Kenyans everywhere to develop world class locally relevant content and get this industry to rapidly match the lucrative opportunities for talented content developers in developed nations.”

 

(Source: Afrinnovator)

Full story

Afrinnovator

Thursday, June 03, 2010 4:07:27 PM (W. Europe Standard Time, UTC+01:00)  #     | 
 Wednesday, June 02, 2010

In Africa, few countries have started their security project and fulfilled some good steps; other countries have now started implementing national mechanisms for combating cybercrime and other related threats; however, a sizeable number of African countries still do not have a strategic plan and are unable to start their first actions. These countries need to be assisted and supported, through guidance and advisory services as well as experience and information sharing with others. Knowledge and information sharing is indeed the missing link at the moment.

CERT-AFRICA is ultimately the resource outlet that will help security experts to share and enhance collaboration to address security threat by connecting leading African security experts and bringing them around a common project. While CERT-AFRICA will be inward looking for its activities, it will also be a conduit for connecting African countries to ongoing efforts within international instances such as the FIRST, the ITU, ICANN, UNCTAD, OIC, etc.

 

(Source: CERT Africa)

Full story

CERT Africa

Wednesday, June 02, 2010 2:43:40 PM (W. Europe Standard Time, UTC+01:00)  #     | 

The number of internet threats coming from the UK has increased in May, according to research by managed security firm, Network Box. The UK is now responsible for nearly six (5.9) per cent of the world’s internet viruses, up from three per cent in April. The only countries that produce more viruses than the UK are Korea (16.26 per cent) and the US (11.68 per cent). The US and India continue to dominate the production of the world’s spam, with the US producing 10.7 per cent, and India 7.1 per cent (similar figures from last month).

Russia has seen a decline in viruses produced from within its borders – possibly an early result of Russian hosting service, PROXIEZ-NET – notoriously used by criminal gangs – being taken down earlier this month.

 

(Source: Network Box)

Full story

Network Box

Wednesday, June 02, 2010 2:06:48 PM (W. Europe Standard Time, UTC+01:00)  #     | 

Internet security firm Sophos has warned Facebook users to be on the alert for a scam which sends a spam message to all of their friends on the social network. Sophos, in a pair of blog posts late Monday, said "hundreds of thousands" of Facebook users have fallen for the scam which it dubbed "likejacking." It said some Facebook users had received a message such as "This man takes a picture of himself EVERYDAY for 8 YEARS!!" and were encouraged to click on a link. "This of course posts a message to your newsfeed, your friends see it and click on it, and so it spreads," Sophos said.

That followed a similar scam that spread on Facebook the week before involving a fake posting tagged as the "sexiest video ever," according to Sophos.

 

(Source: AFP)

Full story

AFP

Wednesday, June 02, 2010 1:50:47 PM (W. Europe Standard Time, UTC+01:00)  #     |